#
blueteam
Here are 112 public repositories matching this topic...
GTFOBins is a curated list of Unix binaries that can used to bypass local security restrictions in misconfigured systems
linux
unix
reverse-shell
binaries
post-exploitation
bypass
exfiltration
blueteam
redteam
bind-shell
gtfobins
-
Updated
Jan 19, 2021 - HTML
An Information Security Reference That Doesn't Suck
windows
linux
osx
reverse-engineering
hacking
forensics
penetration-testing
infosec
pentesting
references
information-security
privilege-escalation
exfiltration
infosec-reference
red-team
blueteam
hacking-simulator
privilege-escalation-exploits
mitre-attack-db
-
Updated
Dec 30, 2020
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
-
Updated
Jan 10, 2021 - XSLT
Investigate malicious Windows logon by visualizing and analyzing Windows event log
-
Updated
Jan 10, 2021 - Python
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
-
Updated
Dec 10, 2018 - XSLT
ethack
commented
Dec 14, 2020
So instead of having to do rita import --config etc/rita.yaml ... we would do rita --config etc/rita.yaml import .... This makes it easier to modify most commands since --config is less likely to change than the rita subcommand. It also makes it possible to create aliases like:
alias rita1=rita --config /etc/rita/config1.yamlalias rita2=rita --config /etc/rita/config2.yaml
Wher
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
security
cheatsheet
cybersecurity
infosec
pentesting
bugbounty
pentest
blueteam
default-password
credentials-gathering
-
Updated
Jan 17, 2021 - Jupyter Notebook
Snoop — инструмент разведки на основе открытых данных (OSINT world)
windows
linux
security
osint
scanner
geo
geolocation
web-scraping
ip
police
infosec
ctf
termux
pentest
nickname
blueteam
redteam
username-checker
intelligence-service
username-search
-
Updated
Jan 19, 2021 - Python
个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
security
collection
study
poc
pentest
markdown-article
writeup
blueteam
ics-security
pentest-tool
redteam
linux-learning
post-penetration
-
Updated
Dec 31, 2020 - C++
A collection of awesome security hardening guides, tools and other resources
security
best-practices
cybersecurity
infosec
awesome-list
security-hardening
cyber-security
computer-security
blueteam
security-tools
blue-team
linux-hardening
cis-benchmarks
windows-hardening
-
Updated
Nov 23, 2020
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
-
Updated
Aug 16, 2020 - Python
Scan your code for security misconfiguration, search for passwords and secrets. 🔍
-
Updated
Dec 29, 2020 - JavaScript
Bloodhound for Blue and Purple Teams
neo4j
directory
active-directory
bloodhound
active
infosec
blueteam
purpleteam
bloodhoundad
bloodhoundad-cypher-queries
purple-teams
plumhound-tasks
bloodhoundad-pathfinding-engine
bluehound
attack-paths
-
Updated
Dec 16, 2020 - Python
WADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
windows
persistence
commands
cheatsheet
enumeration
exploitation
privilege-escalation
blueteam
redteam
wadcoms
-
Updated
Dec 31, 2020 - HTML
-
Updated
Feb 1, 2020 - Python
Open
Add Docker support
GeekMasher
commented
Mar 4, 2018
This repository contains full code examples from the book Gray Hat C#
c-sharp
security
automation
xamarin
dotnet
mono
clamav
sql-injection
pentesting
fuzzer
nessus
openvas
sqlmap
payload
arachni
nexpose
cuckoo-sandbox
metasploit
blueteam
redteam
-
Updated
Jul 21, 2017 - C#
Test Blue Team detections without running any attack.
-
Updated
Oct 8, 2020 - C#
Data leak checker & OSINT Tool
python
data
gui
opensource
osint
email
pyqt5
password
cybersecurity
pyside2
pentest
leak
blueteam
security-tools
data-breach
data-security
data-leak
security-team
-
Updated
Jan 7, 2021 - Python
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
hacking
forensics
penetration-testing
infrastructure-monitoring
forensic-analysis
blueteam
hacking-attack-tools
internal-pentest
redteaming
blue-team
redteam
hacking-tools
purpleteam
forensics-investigations
-
Updated
Aug 4, 2018 - Python
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
-
Updated
Dec 15, 2020 - Shell
Find cloud assets that no one wants exposed 🔎 ☁️
aws
cloud
api-documentation
penetration-testing
infosec
blueteam
security-tools
cloud-security
attack-surface
amazonaws
security-engineer
-
Updated
Jul 20, 2020 - Go
Monitoring your Slack workspaces for sensitive information
slack
tools
monitoring
cybersecurity
infosec
slack-api
red-team
blueteam
blue-team
redteam
purpleteam
purple-team
slack-workspaces
-
Updated
Dec 24, 2020 - Python
A Solution For Cross-Platform Obfuscated Commands Detection 动静态Bash/CMD/PowerShell命令混淆检测框架
-
Updated
Aug 21, 2019
Windows Hardening settings and configurations
windows
checklist
security
registry
powershell
audit
windows-10
hardening
defense
blueteam
windows-hardening
policy-analyzer
-
Updated
Jan 8, 2021 - PowerShell
A collection of scripts I've written to help red and blue teams with malware persistence techniques.
-
Updated
May 30, 2018 - PowerShell
Improve this page
Add a description, image, and links to the blueteam topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the blueteam topic, visit your repo's landing page and select "manage topics."
Some of the dorks are not that helpful and coul be replaced with more useful stuff.